We study the issue of convergence of user rates and resource prices under a family of rate control schemes called dual algorithms with arbitrary communication delays. We first con...
Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
While the IEEE P1500 standards working group is on the verge of recommending a standard test interface for "non-mergeable" cores, a need was felt to adopt a standard met...
Michael G. Wahl, Sudipta Bhawmik, Kamran Zarrineh,...
The Internet offers remote access to many information systems to users independent of time and location. This paper describes an agent based approach to deal with issues that rise ...
In this paper, I describe how various understandings of community activated the design of Dialup Radio, a mobile phonebased independent media distribution system for Zimbabwean ci...